ASSESSMENT OF THE IMPACT OF INFORMATION SECURITY ON THE PERFORMANCE OF AUTOMATED CONTROL SYSTEMS FOR SPECIAL PURPOSES
Alexey A. Adarichev, Federal State Fiscal Establishment “12 Central Scientific Research Institute” of the Ministry of Defence of the Russian Federation, Moscow, Russia, fgu12tsnii@mil.ru
Abstract
High demands are placed on automated control systems to ensure efficiency in current conditions. Particularly acute are the problems of operational efficiency in automated control systems for hazardous industries, in transport, and also in military control systems, i.e. in special purpose automated control systems (ACS SP). Innovative ACS SPs are basically a computer networks, as a rule, with dedicated servers for centralized data storage. Information protection tools (IPT) used as part of ACS SP is surely to affect the efficiency of solving functional problems in such computer networks. On the one hand, the functioning of the IST increases the total time of completing tasks in the automated control system by reducing the speed of the information-computing processes. Keeping data secure is one of the tasks to be solved in the constructing of automated control systems for special purposes (ACS SP). The functioning of infosecurity systems has a significant impact on the information’s speed and computing processes in the ACS SP. The article deals with the concept of dual influence of infosecurity on the ACS SP performance under the influence of infosecurity’s threats. The impact of infosecurity’s researching proposed to use simulation on the ACS SP. The results of modeling have shown that in the conditions of intensive impact of is threats it is expedient to use specialized data recovery tools as part of information protection facilities complexes.
Keywords: infosecurity, performance of automated control systems, infosecurity tools, data recovery, simulation model of infosecurity system.
References
- GOST R 51624-2000. Information protection. Automated systems in a secure execution. General requirements.
- Guidance document. The concept of information protection from unauthorized access. State technical Commission of Russia (1992).
- Kleinrock L. (1979) Computing systems with queues. Moscow. 600 p.
- Kleinrock L. (1979) Theory of Queuing. Moscow.432 p.
- Ferrari D. (1981) Performance Evaluation of computing systems. Moscow.
- Kovalenko I.N., Filippova A. A. (1982) Probability Theory and mathematical statistics: Studies. benefit. Moscow.256 p.
- Ventzel E.S., Ovcharov L.A. (2003) Probability Theory and its engineering applications. Moscow. 464 p.
- Special-purpose operating system “Astra Linux Special Edition” Manual for PFC. Part 1. RUSB.10015-01 9701-1.
- Maksimey I.V. (1988) Imitating modeling on computers. 323 p.
- Kelton, V., Lowe, A. (2004) Simulation modeling. Classic CS. 847 p.
- Rosenko, A.P. (2010) Internal threats to the security of confidential information: Methodology and theoretical research. 160 p.
- Klimov, S.M. (2008) Methods and models of counteraction to computer attacks. 316 p.
- Yazov, Yu.K. Fundamentals of the methodology of quantitative evaluation of the effectiveness of information security in computer systems. Rostov-on-don: Izd-vo sknts VSH, 2006. 274 p.
- Melnikov V.V. Information Security in automated systems. Moscow: Finance and statistics, 2003. 368 p.
- Kiselev V.D., Esikov O.V., Kislitsyn A.S. Theoretical bases of optimization of information-computing process and structure of complexes of information security in computer networks. Moscow: publishing house of Poligrafservis twenty-first century, 2003. 145 p.
16. Radko N. M. Skobelev I. O. Risk-models of information and telecommunication systems in the implementation of threats of remote and direct access. Moscow: Radiosoft, 2011. 232 p.

